Social Cybersecurity (The Role of Social media in Information wars)

Document Type : Original Article

Authors

1 PhD student in political science and researcher at the Higher National Defense University

2 Master of Communication Sciences, Radio and Television University

Abstract

In contrast to more traditional forms of cyberattack, cyber operations today target people within a society, influencing their beliefs as well as behaviors, and diminishing trust in the government. Islamic Republic of Iran adversaries now seeks to control and exploit the Social Media capacities to harm national interests, discredit public and private institutions, and sow domestic strife. This imperceptible operation represents a relatively novel and increasingly dangerous means of persuasion within social media. Thus, instead of attacking the military or economic infrastructure, state and non-state actors outside Iran can access streams of online information via social media to menace the social cybersecurity of Iran. This research study the quiddity of social cybersecurity and its differences with cybersecurity. Based on the results, social cybersecurity in terms of nature, tools, and goals is different from cybersecurity. Social media due to two important factors; “Decentralization” and “Physical presence not required” provide space for creation and spread Harmful content like fake news and threat social cybersecurity.
 

Keywords


  • الف. منابع فارسی

    • اکبری­تبار، علی‌اکبر و اسکندری‌پور، ابراهیم (1391)، روش مطالعه علمی در باب صفحه‌های مرتبط با شبکه‌های رادیو و تلویزیونی در شبکه‌های اجتماعی مجازی (با رویکرد ترکیبی کمّی و کیفی)، پژوهش‌های ارتباطی، 20(76)، 141-113.
    • حافظ­­نیا، محمدرضا (1387)، مقدمه­ای بر روش تحقیق در علوم انسانی، تهران: سازمان مطالعه و تدوین کتب علوم انسانی دانشگاه‌ها (سمت).
    • خلیلی­پور رکن‌آبادی، علی و نورعلی­وند، یاسر (1391)، تهدیدات سایبری و تأثیر آن بر امنیت ملی، فصلنامه مطالعات راهبردی، 2(56)، 196-167.
    • ریخته‌گر برنجی، ریحانه و کدخدایی عباس (1397)، رویکرد حقوق بین‌الملل در خصوص تبلیغات خصمانه برای جنگ (پروپاگاندا)، فصلنامه مطالعات حقوق عمومی، 48(3)، 545-525.‎
    • ساعی، محمدحسین؛ آزادی، محمدحسین و البرزی دعوتی، هادی (1398)، ظهور «خبر جعلی» در «عصر پساحقیقت»؛‌ اهداف و پیامدها، فصلنامه رسانه­های دیداری و شنیداری، 13(31)، 85-59.
    • محسنیان راد، مهدی (1384)، ایران در چهار کهکشان ارتباطی، تهران: انتشارات سروش.
    • مشرق (1398)، مرکز اعتدال چه نقشی در تحولات اخیر عراق داشته است؟ منتشرشده در 12/7/1398. ir/998349. مطالعه­شده در 25/12/1398.
    • ناطقی، امیرحسین (1397)، دگردیسی نظریه­های ارتباطی از رسانه‌های سنتی به رسانه­های نوین: مطالعه تطبیقی برجسته­سازی تلویزیونی و ترند توییتری در رخدادهای دی­ماه 1396، پایان‌نامه کارشناسی ارشد علوم ارتباطات اجتماعی، تهران: دانشگاه صداوسیما.

     

    ب. منابع انگلیسی

    • Agarwal, N., & Bandeli, K. K. (2018). Examining strategic integration of social media platforms in disinformation campaign coordination. Defence Strategic Communications, 4(1), 173.
    • Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 Election. Journal of Economic Perspectives, 31(2), 211-36.
    • Asur, S., Huberman, B. A., Szabo, G., & Wang, C. (2011, July). Trends in social media: Persistence and decay. In Fifth international AAAI conference on weblogs and social media.
    • Bartles, C. K. (2016). Getting Gerasimov Right. Military Review, 96(1), 30-38.
    • Baumann, R. F. (2018). A Central Asian Perspective on Russian Soft Power: The View from Tashkent. Military Review, 98(4), 48.
    • Beskow, D. M., & Carley, K. M. (2019). Social cybersecurity: an emerging national security requirement. Military Review, 99(2), 117.
    • Beskow, D. M., & Carley, K. M. (2019). Social cybersecurity: an emerging national security requirement. Military Review, 99(2), 117.
    • Carley, K. M., Cervone, G., Agarwal, N., & Liu, H. (2018, July). Social cyber-security. In International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (pp. 389-394). Springer, Cham.
    • , R. (1987). The truth twisters. Macdonald.
    • Ellul, J. (1973). Propaganda: The formation of men's attitudes (pp. 116-120). New York: Vintage Books.
    • Flaxman, S., Goel, S., & Rao, J. M. (2016). Filter bubbles, echo chambers, and online news consumption. Public opinion quarterly, 80(S1), 298-320.
    • Hussain, Murtaza. (2019). An Iranian activist wrote dozens of articles for right-wing outlets. But is he real person?. Published June 9 2019, https://theintercept.com/2019/06/09/heshmat-alavi-fake-iran-mek/.
    • Jeremy, Scott-Joynt. (2005). What Myspace Means to Murdoch. BBC News Analysis, 19 July 2005, http://news.bbc.co.uk/2/hi/business/4697671.stml.
    • Joshua, Yaffa (2014). Dmitry Kiselev Is Redefining the Art of Russian Propaganda. The New Republic (website), 1 July 2014, accessed 14 November 2018, https://newrepublic.com/article/118438/dmitrykiselev-putins-favorite-tv-host-russias-top-propogandist.
    • Jowett, G. S., & O'donnell, V. (2018). Propaganda & persuasion. Sage Publications.
    • Kahne, J., & Bowyer, B. (2018). The political significance of social media activity and social networks. Political Communication, 35(3), 470-493.
    • McGarty, C., Thomas, E. F., Lala, G., Smith, L. G., & Bliuc, A. M. (2014). New Technologies, New Identities, and the Growth of Mass Opposition in the A rab S pring. Political Psychology, 35(6), 725-740.
    • Mulvenon, J. (1999). “The PLA and information warfare”. The People’s Liberation Army in the Information Age, 297, pp.175-186.
    • , E. (2011). The filter bubble: What the Internet is hiding from you. Penguin UK.
    • Prier, J. (2017). Commanding the trend: Social media as information warfare. Strategic Studies Quarterly, 11(4), 50-85.
    • Resnick, P., Garrett, R. K., Kriplean, T., Munson, S. A., & Stroud, N. J. (2013, February). Bursting your (filter) bubble: strategies for promoting diverse exposure. In Proceedings of the 2013 conference on Computer supported cooperative work companion (pp. 95-100). ACM.
    • Rugge, Fabio. (2018). “‘Mind Hacking’: Information Warfare in the Cyber Age,” Analysis No. 319, Italian Institute for International Political Studies, 11 January 2018, accessed 14 November 2018, https://www.ispionline.it/en/pubblicazione/ mind-hacking-information-warfare-cyber-age-19414.
    • Shearer, Elisa & Gottfried ,Jeffrey .(2017). News Use Across Social Media Platforms 2017,” Pew Research Center, 7 September 2017, accessed 14 November 2018, http:// www.journalism.org/2017/09/07/news-use-across-socialmedia- platforms-2017/.
    • Taddeo, M. (2012). “Information warfare: A philosophical perspective”. Philosophy & Technology, 25(1), pp.105-120.
    • Theohary, C. A. (2018). “Information Warfare: Issues for Congress”. Congressional Research Service.
    • Uyheng, J., Magelinski, T., Villa-Cox, R., Sowa, C., & Carley, K. M. (2019). Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018. Computational and Mathematical Organization Theory, 1-19.
    • Wilson, C. (2004). Information Warfare and Cyberwar: Capabilities and Related Policy Issues. CRS Report for Congress. pp.1-21.
    • Zuiderveen, Borgesius, F., Trilling, D., Möller, J., Bodó, B., De Vreese, C. H., & Helberger, N. (2016). Should we worry about filter bubbles?. Internet Policy Review. Journal on Internet Regulation, 5(1).